CVE-2025-54403

8.8 HIGH

📋 TL;DR

This CVE describes OS command injection vulnerabilities in Planet WGR-500 routers that allow remote attackers to execute arbitrary commands via specially crafted network requests targeting the 'new_password' parameter. Attackers can gain full control of affected devices. Organizations using Planet WGR-500 routers with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Planet WGR-500
Versions: v1.3411b190912
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the swctrl functionality specifically. No special configuration required - default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to pivot to internal networks, intercept/modify traffic, install persistent backdoors, or use the device for botnet activities.

🟠

Likely Case

Router takeover leading to network traffic interception, credential theft, and potential lateral movement to connected devices.

🟢

If Mitigated

Limited impact if device is behind strict network segmentation with no internet exposure and strong access controls.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited via network requests, making internet-exposed devices immediately vulnerable to remote attackers.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to gain router control and pivot further.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on the description, exploitation appears straightforward via network requests to the vulnerable parameter. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Planet vendor website for firmware updates
2. Download latest firmware if available
3. Upload via router admin interface
4. Reboot router after update
5. Verify version is no longer v1.3411b190912

🔧 Temporary Workarounds

Network Isolation

all

Isolate affected routers from internet and restrict network access

Access Control Lists

linux

Implement strict firewall rules to limit access to router management interface

iptables -A INPUT -p tcp --dport [router-port] -s [trusted-ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [router-port] -j DROP

🧯 If You Can't Patch

  • Replace affected routers with different models or vendors
  • Implement network segmentation to isolate router traffic and limit blast radius

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface. If version is v1.3411b190912, device is vulnerable.

Check Version:

Check via router web interface or SSH: show version or equivalent command

Verify Fix Applied:

Verify firmware version has changed from v1.3411b190912 and test password change functionality with malicious payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual password change attempts
  • Suspicious commands in system logs
  • Multiple failed authentication attempts followed by password changes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic to known malicious IPs
  • Unexpected SSH/Telnet connections from router

SIEM Query:

source="router.log" AND ("new_password" OR "swctrl") AND (cmd.exe OR bash OR sh OR | OR ; OR $)

🔗 References

📤 Share & Export